Abstract is missing.
- ForNet: A Distributed Forensics NetworkKulesh Shanmugasundaram, Nasir D. Memon, Anubhav Savant, Hervé Brönnimann. 1-16 [doi]
- Usage Control: A Vision for Next Generation Access ControlRavi S. Sandhu, Jaehong Park. 17-31 [doi]
- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOLThumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin. 32-46 [doi]
- Complexity Problems in the Analysis of Information Systems SecurityAnatol Slissenko. 47-56 [doi]
- A Behavior-Based Approach to Securing Email SystemsSalvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. 57-81 [doi]
- Real-Time Intrusion Detection with Emphasis on Insider AttacksShambhu J. Upadhyaya. 82-85 [doi]
- Relating Process Algebras and Multiset Rewriting for Immediate Decryption ProtocolsStefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli. 86-99 [doi]
- GRID Security ReviewLazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis. 100-111 [doi]
- A Knowledge-Based Repository Model for Security Policies ManagementSpyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis. 112-121 [doi]
- Symbolic Partial Model Checking for Security AnalysisFabio Martinelli. 122-134 [doi]
- Rule-Based Systems Security ModelMichael Smirnov. 135-146 [doi]
- Logical Resolving for Security EvaluationPeter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin. 147-156 [doi]
- Enhanced Correlation in an Intrusion Detection ProcessSalem Benferhat, Fabien Autrel, Frédéric Cuppens. 157-170 [doi]
- Safeguarding SCADA Systems with Anomaly DetectionJohn Bigham, David Gamez, Ning Lu. 171-182 [doi]
- Experiments with Simulation of Attacks against Computer NetworksIgor V. Kotenko, Evgeny Man kov. 183-194 [doi]
- Detecting Malicious Codes by the Presence of Their Gene of Self-replication Victor A. Skormin, Douglas H. Summerville, James Moronski. 195-205 [doi]
- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call SequencesKyubum Wee, Byungeun Moon. 206-216 [doi]
- Distributed Access Control: A Logic-Based ApproachSteve Barker. 217-228 [doi]
- Advanced Certificate Status ProtocolDae Hyun Yum, Jae Eun Kang, Pil Joong Lee. 229-240 [doi]
- Key History Tree: Efficient Group Key Management with Off-Line MembersAntonio Lain, Viacheslav Borisov. 241-254 [doi]
- A Certificate Status Checking Protocol for the Authenticated DictionaryJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano. 255-266 [doi]
- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based ApproachRuben Wolf, Markus Schneider. 267-278 [doi]
- A Signcryption Scheme Based on Secret Sharing TechniqueMohamed Al-Ibrahim. 279-288 [doi]
- A Zero-Knwoledge Identification SchemePino Caballero-Gil, Candelaria Hernández-Goya. 289-297 [doi]
- Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential PropertyYoungdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim. 298-307 [doi]
- Achievability of the Key-Capacity in a Scenario of Key SharingValery I. Korzhik, Viktor Yakovlev, Alexander Sinuk. 308-315 [doi]
- On Cipher Design Based on Switchable Controlled OperationsNick A. Moldovyan. 316-327 [doi]
- Elliptic Curve Point MultiplicationAlexander Rostovtsev, Elena Makhovenko. 328-336 [doi]
- Encryption and Data Dependent Permutations: Implementation Cost and Performance EvaluationNicolas Sklavos, Alexander A. Moldovyan, Odysseas G. Koufopavlou. 337-348 [doi]
- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography ChannelVladimir Gorodetsky, Vladimir Samoilov. 349-359 [doi]
- Detection and Removal of Hidden Data in Images Embedded with Quantization Index ModulationKaiwen Zhang, Shuozhong Wang, Xinpeng Zhang. 360-370 [doi]
- Digital Watermarking under a Filtering and Additive Noise Attack ConditionValery I. Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba. 371-382 [doi]
- Data Hiding in Digital Audio by Frequency Domain DitheringShuozhong Wang, Xinpeng Zhang, Kaiwen Zhang. 383-394 [doi]
- Steganography with Least Histogram AbnormalityXinpeng Zhang, Shuozhong Wang, Kaiwen Zhang. 395-406 [doi]
- Multi-bit Watermarking Scheme Based on Addition of Orthogonal SequencesXinpeng Zhang, Shuozhong Wang, Kaiwen Zhang. 407-418 [doi]
- Authentication of Anycast CommunicationMohamed Al-Ibrahim, Anton Cerný. 419-423 [doi]
- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP ProxyRuo Ando, Yoshiyasu Takefuji. 424-427 [doi]
- Construction of the Covert ChannelsAlexander Grusho, Elena Timonina. 428-431 [doi]
- Privacy and Data Protection in Electronic CommunicationsMitrou Lilian, Konstantinos Moulinos. 432-435 [doi]
- Multiplier for Public-Key Cryptosystem Based on Cellular AutomataHyun-Sung Kim, Sung Ho Hwang. 436-439 [doi]
- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and ProtocolsSri Kumar, Vladimir Marbukh. 440-443 [doi]
- Alert Triage on the ROCFrancisco J. Martín, Enric Plaza. 444-448 [doi]
- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64Nick D. Goots, Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan. 449-452 [doi]
- Immunocomputing Model of Intrusion DetectionYuri Melnikov, Alexander O. Tarakanov. 453-456 [doi]
- Agent Platform Security ArchitectureGustavo Santana, Leonid Sheremetov, Miguel Contreras. 457-460 [doi]
- Support Vector Machine Based ICMP Covert Channel Attack DetectionTaeshik Shon, Taewoo Noh, Jongsub Moon. 461-464 [doi]
- Computer Immunology System with Variable ConfigurationSvetlana P. Sokolova, Ruslan S. Ivlev. 465-468 [doi]